Search Results - (( java implementation mining algorithm ) OR ( rendering process based algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION by Adi, Waskito

    Published 2011
    “…The design of the proposed framework involves haptic texture rendering algorithm and query algorithm. The proposed framework integrates computer haptic and content based image retrieval (CBIR) where haptic texture rendering is performed based on extracted cloth data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Segmentation Assisted Object Distinction For Direct Volume Rendering by Irani, Arash Azim Zadeh

    Published 2013
    “…A local rendering process adds two advantageous aspects to global rendering module. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An efficient real-time terrain data organization and visualization algorithm based on enhanced triangle-based level of detail technique by Zamri, Muhamad Najib

    Published 2006
    “…The purpose of this research is to design, develop and implement an algorithm for enhancing the rendering efficiency of triangle-based LOD technique. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A cognitive mapping approach in real-time haptic rendering interaction for improved spatial learning ability among autistic people / Kesavan Krishnan by Kesavan , Krishnan

    Published 2024
    “…Meanwhile, experimental evaluation of the application was conducted in four different groups to measure the efficiency and performance of the application; experimental evaluation based on navigation algorithms, experimental evaluation based on haptic sensory sensitivity, experimental evaluation based on real-time haptic rendering interaction and experimental evaluation based on the performance of autistic people with using the application in spatial learning and cognitive mapping. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat by Abdul Samat, Syafiq

    Published 2021
    “…In this case, difference in sound level may change the shape of a brush and introduce different colour at random time may affect the look of a render. However, since this is generative art, result often varies by each render, yet maintain recognizable similarities between the same algorithms. …”
    Get full text
    Get full text
    Book Section
  13. 13

    Out-of-core simplification with appearance preservation for computer game applications by Tan, Kim Heok

    Published 2006
    “…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Out-of-core simplification with appearance preservation for computer game applications by Bade, Abdullah, Daman, Daut, Sunar, Mohd. Shahrizal, Tan , Kim Heok

    Published 2006
    “…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
    Get full text
    Get full text
    Monograph
  15. 15

    The development of level of detail (LOD) technique in 3D computer graphics application by Ismail, Nor Anita Fairos, Daman, Daut, Mohd. Rahim, Mohd. Shafry

    Published 2009
    “…During run-time, the visible mesh is rendered based on the distance criterion by extracting the required data from the previously generated octree structure. …”
    Get full text
    Get full text
    Monograph
  16. 16
  17. 17

    Protected control packets to prevent denial of services attacks in IEEE 802.11 wireless networks by Malekzadeh, Mina, Abdul Ghani, Abdul Azim, K. Subramaniam, Shamala

    Published 2011
    “…The first model is based on original HMAC-SHA1 algorithm and the second one is based on a proposed modified HMAC-SHA1 (M-hmac) algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    E-Raser: file shredder application with content replacement by using random words function by Mohd Nahar, Nur Farah Aqilah, Ab Rahman, Nurul Hidayah, Mohammad, Kamarudin Malik

    Published 2018
    “…Data shredding indicates a process of irreversible file destruction while file shredder is the program designed to render computer-based files unreadable by implementing overwriting method to destroy data in the content of a file. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Modeling 2D appearance evolution for 3D object categorization by Mohd Zaki, Hasan Firdaus, Shafait, Faisal, Mian, Ajmal

    Published 2016
    “…Firstly, we train view-invariant models based on a deep convolutional neural network (CNN) using the rendered RGB-D images and learn to rank the first fully connected layer activations and, therefore, capture the evolution of these extracted features. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20

    Development of behavior-based reactive navigation system for mobile robot by Mohd Hamami, Mohd Ghazali

    Published 2013
    “…The algorithm also control the robot velocity during its navigation based on the Euclidean distance of the robot and the target and also distance input from the sensors. …”
    Get full text
    Get full text
    Thesis